US20050125653A1 - Protocol for controlling access, through specific time ranges, to scrambled data - Google Patents

Protocol for controlling access, through specific time ranges, to scrambled data Download PDF

Info

Publication number
US20050125653A1
US20050125653A1 US10/506,501 US50650104A US2005125653A1 US 20050125653 A1 US20050125653 A1 US 20050125653A1 US 50650104 A US50650104 A US 50650104A US 2005125653 A1 US2005125653 A1 US 2005125653A1
Authority
US
United States
Prior art keywords
access
scrambled information
time range
viewings
criterion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/506,501
Inventor
Claudia Becker
Andre Codet
Pierre Fevrier
Chantal Guionnet
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Viaccess SAS
Original Assignee
Viaccess SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Viaccess SAS filed Critical Viaccess SAS
Assigned to VIACCESS reassignment VIACCESS ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BECKER, CLAUDIA, CODET, ANDRE, FEVRIER, PIERRE, GUIONNET, CHANTAL
Publication of US20050125653A1 publication Critical patent/US20050125653A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H60/00Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
    • H04H60/09Arrangements for device control with a direct linkage to broadcast information or to broadcast space-time; Arrangements for control of broadcast-related services
    • H04H60/14Arrangements for conditional access to broadcast information or to broadcast-related services
    • H04H60/23Arrangements for conditional access to broadcast information or to broadcast-related services using cryptography, e.g. encryption, authentication, key distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4623Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Definitions

  • the invention relates to a protocol for controlling access to scrambled data in specific time ranges.
  • methods of controlling access to scrambled data transmitted in point-to-multipoint mode are based on comparing access criteria supplied in access control messages or “entitlement control messages” (ECMs), against entitlements or access rights held by each user and registered in a decoder supplied to each user or preferably in an access control module, for example a smart card, supplied to each user.
  • ECMs access control messages
  • decoder supplied to each user or preferably in an access control module, for example a smart card
  • the information is scrambled at a sending centre using a service key.
  • the service key is contained in a control word.
  • the control word is encrypted by means of an operating key, and the cryptogram of the control word is sent to at least one descrambling terminal associated with an access control module provided with a security processor.
  • the scrambled information and the periodic access control messages, ECM messages include the cryptogram of the control word and the access criteria, with the control word and the cryptogram of the control word being changed periodically.
  • Access to the scrambled information at each descrambling terminal is conditional upon a “true” value for the access criteria when compared with at least one access right registered in the access control module, and then upon decryption of the cryptogram of the control word using the operating key, in order to recover the control word and use it descramble the scrambled information.
  • An object of the present invention is to remedy the drawbacks and limitations of prior art access control methods.
  • a more specific object of the present invention is to provide a protocol for controlling access to scrambled information in specific time ranges of adjustable particular durations.
  • Another object of the present invention is to provide a protocol for controlling access to scrambled information in specific time ranges, with it being possible for the origin of a specific time range to be defined with reference to a specific action of each user.
  • another object of the present invention is to implement a plurality of new services associated with the broadcasting of television programs, such as: a service for previewing a broadcast television program for a particular time; a controlled rewind access service after recording a broadcast television program; a service for counting the number of viewings in the event of looped broadcasting of television programs.
  • a further object of the present invention is to implement an access control protocol which, through identification of all or part of a program already viewed by a subscriber (to which access has therefore already been granted), distinguishes any period that has already been viewed by the user, and thus optimizes the management of viewings based on a criterion of some particular number of repeat viewings, or a new viewing as the case may be.
  • a further object of the present invention is to implement an access control protocol for limiting the number of playbacks, and for limiting the magnitude of the authorized rewind.
  • the protocol of the invention for controlling access to scrambled information is implemented at a broadcast centre. Scrambling is effected using a service key contained in a control word.
  • the control word is encrypted by means of an operating key, and the access control protocol consists at least in sending the scrambled information and periodic access control messages, ECM messages, to at least one descrambling terminal associated with an access control module provided with a security processor, the ECM messages, containing access criteria and the cryptogram of the control word.
  • the control word and the cryptogram of the control word are changed periodically.
  • Access to the scrambled information at each descrambling terminal is conditional upon a “true” value for the access criteria when compared with at least one access right registered in the access control module and then upon decrypting the cryptogram of the control word using the operating key, in order to recover the control word and descramble the scrambled information.
  • the access control protocol of the present invention is particularly suitable for point-to-multipoint transmission of scrambled information, in particular television programs, and managing pay TV services in general.
  • FIG. 1 a is, by way of purely illustrative example, a general flowchart for implementing the protocol of the present invention
  • FIG. 1 b comprises different timing diagrams illustrative of time ranges constituting a backward interval, a forward interval, and a forward-backward interval, respectively;
  • FIG. 2 is, by way of purely illustrative example, a flowchart of a specific implementation of the protocol of the present invention, more particularly suited for managing services such as a previewing service for a scrambled broadcast TV program, a rewind service, and a service for managing numbers of viewings in the event of looped broadcasting.
  • the protocol that is the subject matter of the present invention is implemented firstly at a transmission centre CE and secondly at a plurality of descrambling terminals D k , each associated with an access control module constituted by a dedicated smart card including a security processor, for example.
  • the information I is scrambled at the transmission centre CE using a service key contained in a control word CW that is encrypted by means of operating key in a manner that is known in the art.
  • the scrambled information I* is transmitted with periodic access control messages, known as ECM messages.
  • the messages contain access criteria.
  • the cryptogram of the control word CW, and in particular the control word, are changed periodically.
  • Access to the scrambled information at each descrambling terminal D k is conditional upon the access criteria conveyed by the access control messages ECM giving a “true” value when compared with at lest one access right registered in the access control module associated with each descrambling terminal D k .
  • the protocol further consists in, the transmission centre CE in particular, assigning each access control message, ECM message, a number T j satisfying a monotonic non-decreasing function, for which reason the access control messages are denoted ECM j , where j designates the rank of the above-mentioned number.
  • the sending time of the request is identified relative to the current number T j detected in the preceding step B, and in particular relative to an earlier event, such as a previous access, as is explained below.
  • the earlier event may correspond to a previous access defining the origin of the timebase whose number is T jo .
  • the number T jo constituting the origin time of the timebase, and which is obtained in the step A may advantageously correspond to the number of the message ECM jo of the most recent previous non-free controlled access stored in the access control module or the card issued to the user, as is explained below.
  • FIG. 1 a there is symbolically represented in the step C the series of successive numbers T j ⁇ 1 , T j , T j+1 and a user request UR, the number T jo for the origin of the timebase being deemed to be less than (i.e. earlier than) the successive numbers of the sequence T j ⁇ 1 , T j , T j+1 .
  • the number T jo for a previous access may nevertheless be greater than the current number T j identifying the sending of the user request UR by the user.
  • Step C of selecting the access control message number may then be followed by a step D of authorizing access by the user to the scrambled information as a function of a specific access criterion, starting from the origin T jo of the timebase and over a time range corresponding to a plurality of individual time intervals defining a plurality of successive individual quanta of scrambled information.
  • ⁇ (T jo , td, tf) represents the access time range assigned to the user, where:
  • the above-mentioned offsets can correspond to at least one individual time interval ⁇ taken to be equal to the sending time of the access control message ECM j .
  • FIG. 1 b The purpose of FIG. 1 b is to illustrate parameters for defining the current access number corresponding to the user request, and previous user access numbers stored in the card in order to constitute the origin T jo of the corresponding timebase, and for a start time td, and an end time tf relative to the origin T jo of the timebase; the parameters T jo , td, and tf therefore define the time range for access authorized in accordance with the specific access criteria, as mentioned above.
  • Line 1 in FIG. 1 b represents the succession of numbers for received messages ECM j , where j designates the rank of the current number for the corresponding message ECM j .
  • the current number of a message ECM j is always non-decreasing during the transmission of a broadcast program.
  • the value T jo stored in the card assigned to the subscriber may correspond to a previous access and be relative to the time interval, or time range, defined by T jo , td, and tf, as represented in lines 2 , 3 , and 4 in FIG. 1 b.
  • Use of the protocol of the present invention is beneficial in these three situations.
  • Line 1 of FIG. 1 c represents a monotonic non-decreasing function in the form of a continuously increasing function of the sending time for control messages ECM j .
  • each number T j is constant over the individual time period ⁇ (j) and satisfies the condition: T j ⁇ 1 ⁇ T j ⁇ T j+1
  • Line 2 in FIG. 1 c represents a monotonic non-decreasing function in the form of a stepped increasing function of the sending time for control messages ECM j .
  • each control message ECM j may be repeated over one or more individual time intervals between the successive numbers T j ⁇ 1 , T j et seq.
  • This mode of operation defines a timebase with a resolution other than the sending time for control messages ECM j .
  • each number T j may be defined by a timestamp.
  • the timestamp is a time value expressed in seconds.
  • Each step T j ⁇ 1 , T j et seq. is then defined by the time range represented by the two different timestamps, for example.
  • An object of the protocol of the present invention is to manage the number of viewings NV of the same program broadcast and/or recorded by a user, where each viewing may comprise access to the same program one or more times, access at two or more separate times being included the same viewing and, in this situation, since the number of viewings is unchanged, no additional amount is billed to the user in this kind of situation.
  • the change however, from one access to another by the user in the same program under conditions other than the specific access above-mentioned criterion counts as two different viewings, one “viewing” and one “other viewing”, the other viewing leading to incrementing the number of viewings and to an additional amount being billed to the user, as described below.
  • the access criterion may, as represented in FIG. 2 , consist in a step E 0 of defining a maximum authorized number of viewings NVM of the scrambled broadcast program containing the scrambled information I*.
  • the protocol of the invention may further define a first Boolean variable AV whose “true” value represents authorization for forward access to the scrambled information I* beyond the origin and outside the above-defined time range without incrementing the number of viewings, with such access to the information beyond the origin and outside the time range being authorized on the basis of an access criterion separate from the specific access criterion defining access in the above-mentioned time range.
  • the protocol may also define a second Boolean variable AR whose “true” value is representative of authorization for backward access to the scrambled information before the origin and outside the time range on the basis of an access criterion different from the above-mentioned specific access criterion and without incrementing the number of viewings.
  • the access criterion specific to the above-defined access time range or region, in particular as defined by the offset parameters td and tf relative the origin T jo of the timebase may advantageously allow the user free access, i.e. unbilled access, in that range.
  • Boolean variables AV and AR referred to above have the value 1 for the “true” value and the value 0 for the “false” value.
  • step E 0 in FIG. 2 on the user sending the user request UR defined by the rank j of the number T j of the corresponding access control message ECM j , there are available:
  • the protocol of the invention may test for the existence of the variable NV in the step E 1 . This test is denoted: ⁇ (NV)?
  • a step E 2 is executed which tests whether the number of viewings NV is less than the maximum number of viewings NVM.
  • the access to the scrambled information program I* is the first access.
  • the step E 5 of updating the origin of the timebase may then be followed by access to the individual quantum of information ⁇ I* (j) in a step E 6 .
  • the first access corresponds to a first viewing and the access criterion applied is an access criterion different from the specific access criterion corresponding to free access.
  • step E 1 is followed by a step E 7 of testing whether the number of viewings NV is less than or equal to the authorized maximum number of viewings NVM.
  • the protocol of the invention tests, in step E 8 , whether the current number T j lies within the time range.
  • access during the time range consists in particular in authorizing successive access to each quantum of information covering the time range, as mentioned above.
  • authorization of access on the basis of an access criterion different from the specific access criterion and conditional on a “true” value of a Boolean variables may consist, in a step E 9 and as represented in FIG.
  • the test E 9 also submits the current number T j and the second Boolean variable AR to a second logic test to verify whether the above-mentioned current number T j is less than or equal to the number T jo for the origin and to verify whether the second Boolean variable AR has the “true” value for authorizing backward access to the scrambled information.
  • the current number T j is this time lower than the origin number T jo .
  • This may be the case, for example, either on returning to a program broadcast in a loop or on rewinding a recording on a recorder.
  • the user wishes to view an earlier episode which may or may not have been accessed previously.
  • step E 2 In the event of a negative result of above-mentioned test E 2 , access to the individual quantum of scrambled information ⁇ I* (j) is refused in step E 3 , the user having exhausted the quota of viewings for the program concerned. Otherwise, in the event of a positive result from test E 2 , the number of viewings NV is incremented by 1, in above-mentioned step E 4 , said step E 4 being followed by authorization of forward access (or backward access as the case may be), to the scrambled information via above-mentioned updating step E 5 .
  • a second embodiment of the protocol of the present invention is described below with reference to the same FIG. 2 in an application to a preview service.
  • the access time area according to the specific access criterion is then defined by:
  • the user is authorized to view only in the above-mentioned time interval or time range a number of successive quanta of scrambled information determined by the magnitude
  • a third embodiment of the protocol of the present invention is described below with reference to the same FIG. 2 , in an application to controlling the number of viewings during the broadcasting of a program in a loop, for example.

Abstract

The invention relates to a protocol for controlling access to scrambled data in specific time ranges, using access control messages ECM. The protocol consists: in assigning (A) each access control message ECM a number (Tj) satisfying a monotonic non-decreasing function, the messages representing a timebase formed by a plurality of individual time intervals for sending successive quanta of information; in detecting (B) in each descrambling terminal the numbers of the access control messages, and then, in response to a user request (UR) from the user; in selecting (C) an access control message number that corresponds to the sending time of the request to constitute a time origin (Tjo) of the timebase; and in authorizing (D), (E) access to the scrambled information as a function of a specific access criterion with reference to the origin (Tjo) and over a time range corresponding to a plurality of individual time intervals defining a plurality of successive quanta of scrambled information. Application to pay TV access control.

Description

  • The invention relates to a protocol for controlling access to scrambled data in specific time ranges.
  • The transmission of scrambled information is currently experiencing unprecedented expansion because of the manifest explosion in the provision of services based on the transmission of data conveying information of the most diverse types.
  • As a general rule, methods of controlling access to scrambled data transmitted in point-to-multipoint mode, for example, are based on comparing access criteria supplied in access control messages or “entitlement control messages” (ECMs), against entitlements or access rights held by each user and registered in a decoder supplied to each user or preferably in an access control module, for example a smart card, supplied to each user.
  • To be more specific, the information is scrambled at a sending centre using a service key. The service key is contained in a control word. The control word is encrypted by means of an operating key, and the cryptogram of the control word is sent to at least one descrambling terminal associated with an access control module provided with a security processor.
  • The scrambled information and the periodic access control messages, ECM messages, include the cryptogram of the control word and the access criteria, with the control word and the cryptogram of the control word being changed periodically. Access to the scrambled information at each descrambling terminal is conditional upon a “true” value for the access criteria when compared with at least one access right registered in the access control module, and then upon decryption of the cryptogram of the control word using the operating key, in order to recover the control word and use it descramble the scrambled information.
  • For a more detailed description of such access control methods reference can usefully be made to the provisions of UTE standard C90-007, January 1994.
  • At present, with reference to the texts and provisions of the above-mentioned standard, since there are no provisions governing processing, from the point of view of access control proper, accessing repeat broadcasts of a television program, viewing a recorded scrambled program, and accessing the first broadcast of a program are all equivalent to accessing a first broadcast.
  • In particular, it is not at present possible to control specifically, through time ranges, the number of viewings, or the number of rewindings in the event of a recording.
  • Consequently, when access control systems are further provided with an electronic token-holder management system, for managing all aspects of access control in terms of account management, for example, any new viewing or any rewinding, in the case of a recording, results either in systematic debiting of the subscriber's electronic token-holder, in an access mode known as time-based impulsive purchase, or in unlimited access, if access is authorized in all other marketed access modes.
  • An object of the present invention is to remedy the drawbacks and limitations of prior art access control methods.
  • In particular, a more specific object of the present invention is to provide a protocol for controlling access to scrambled information in specific time ranges of adjustable particular durations.
  • Another object of the present invention is to provide a protocol for controlling access to scrambled information in specific time ranges, with it being possible for the origin of a specific time range to be defined with reference to a specific action of each user.
  • Given the adjustable nature of the duration of the access time range and/or of the origin of said access time range with reference to a specific action of each user, another object of the present invention is to implement a plurality of new services associated with the broadcasting of television programs, such as: a service for previewing a broadcast television program for a particular time; a controlled rewind access service after recording a broadcast television program; a service for counting the number of viewings in the event of looped broadcasting of television programs.
  • A further object of the present invention is to implement an access control protocol which, through identification of all or part of a program already viewed by a subscriber (to which access has therefore already been granted), distinguishes any period that has already been viewed by the user, and thus optimizes the management of viewings based on a criterion of some particular number of repeat viewings, or a new viewing as the case may be.
  • In the context of recording television programs, a further object of the present invention is to implement an access control protocol for limiting the number of playbacks, and for limiting the magnitude of the authorized rewind.
  • The protocol of the invention for controlling access to scrambled information is implemented at a broadcast centre. Scrambling is effected using a service key contained in a control word. The control word is encrypted by means of an operating key, and the access control protocol consists at least in sending the scrambled information and periodic access control messages, ECM messages, to at least one descrambling terminal associated with an access control module provided with a security processor, the ECM messages, containing access criteria and the cryptogram of the control word. The control word and the cryptogram of the control word are changed periodically. Access to the scrambled information at each descrambling terminal is conditional upon a “true” value for the access criteria when compared with at least one access right registered in the access control module and then upon decrypting the cryptogram of the control word using the operating key, in order to recover the control word and descramble the scrambled information.
  • The protocol is remarkable in that it further consists in assigning each access control message, ECM message, a number satisfying a monotonic non-decreasing function, consecutive messages ECMj with successive numbers Tj representing a timebase formed by a plurality of individual time intervals for sending successive individual quanta of scrambled information. The protocol then consists, in each descrambling terminal, in detecting the number of each access control message, message ECMj, and then, at the request of the user of said descrambling terminal for conditional controlled access to at least a portion of said scrambled information, in selecting an access control number that corresponds to the sending time of said request, and in constituting a time origin of said timebase.
  • Access by the user to the scrambled information is authorized as a function of a specific access criterion from said origin of the timebase over a time range corresponding to a plurality of individual time intervals defining a plurality of successive individual quanta of scrambled information.
  • The access control protocol of the present invention is particularly suitable for point-to-multipoint transmission of scrambled information, in particular television programs, and managing pay TV services in general.
  • The protocol will be better understood on reading the following description and examining the appended drawings, in which:
  • FIG. 1 a is, by way of purely illustrative example, a general flowchart for implementing the protocol of the present invention;
  • FIG. 1 b comprises different timing diagrams illustrative of time ranges constituting a backward interval, a forward interval, and a forward-backward interval, respectively;
  • FIG. 1 c represents, by way of purely illustrative example, different embodiments of a monotonic non-decreasing function;
  • FIG. 2 is, by way of purely illustrative example, a flowchart of a specific implementation of the protocol of the present invention, more particularly suited for managing services such as a previewing service for a scrambled broadcast TV program, a rewind service, and a service for managing numbers of viewings in the event of looped broadcasting.
  • A more detailed description of the protocol of the present invention for controlling access to scrambled information is given below with reference to FIG. 1 a and the subsequent figures.
  • Generally speaking, the protocol that is the subject matter of the present invention is implemented firstly at a transmission centre CE and secondly at a plurality of descrambling terminals Dk, each associated with an access control module constituted by a dedicated smart card including a security processor, for example.
  • The information I is scrambled at the transmission centre CE using a service key contained in a control word CW that is encrypted by means of operating key in a manner that is known in the art.
  • The scrambled information I* is transmitted with periodic access control messages, known as ECM messages. The messages contain access criteria. The cryptogram of the control word CW, and in particular the control word, are changed periodically. Access to the scrambled information at each descrambling terminal Dk is conditional upon the access criteria conveyed by the access control messages ECM giving a “true” value when compared with at lest one access right registered in the access control module associated with each descrambling terminal Dk.
  • The cryptogram of the control word is decrypted at each descrambling terminal, and in particular in the access control module, using the operating key, in order to recover the control word CW and descramble the scrambled information I*.
  • According to a remarkable aspect of the protocol of the present invention for controlling access to scrambled information, the protocol further consists in, the transmission centre CE in particular, assigning each access control message, ECM message, a number Tj satisfying a monotonic non-decreasing function, for which reason the access control messages are denoted ECMj, where j designates the rank of the above-mentioned number.
  • According to a particularly remarkable aspect of the protocol of the present invention, the consecutive control messages ECMj with successive numbers Tj represent a timebase formed by a plurality of individual time intervals for transmitting successive individual quanta of scrambled information. It will thus be understood that between two successive numbers, for example the numbers Tj−1, Tj, corresponding to at least one time interval δ representative of the sending times of the control messages ECMj, an individual quantum of scrambled information denoted δI*(j−1) is sent to each descrambling terminal Dk.
  • At each of the above-mentioned descrambling terminals Dk, the protocol of the present invention then consists in a step B of detecting the number Tj of each access control message ECMj. The operation of detecting the number of each access control message is accompanied by storing the current number.
  • According to another particularly remarkable aspect of the protocol of the present invention, the invention consists, at the request of the user of the descrambling terminal Dk concerned for conditional access to at least a portion of the scrambled information, in selecting, in a step C, a number for an access control message ECMj, which number corresponds to the sending time of the user request UR.
  • Clearly, since the user sends a user request UR over the descrambling terminal (the request may be sent from a program selector such as a remote controller, for example, or by any other means), the sending time of the request is identified relative to the current number Tj detected in the preceding step B, and in particular relative to an earlier event, such as a previous access, as is explained below. The earlier event may correspond to a previous access defining the origin of the timebase whose number is Tjo.
  • In particular, the number Tjo constituting the origin time of the timebase, and which is obtained in the step A, may advantageously correspond to the number of the message ECMjo of the most recent previous non-free controlled access stored in the access control module or the card issued to the user, as is explained below.
  • In FIG. 1 a, there is symbolically represented in the step C the series of successive numbers Tj−1, Tj, Tj+1 and a user request UR, the number Tjo for the origin of the timebase being deemed to be less than (i.e. earlier than) the successive numbers of the sequence Tj−1, Tj, Tj+1. In any event, it is clear that the number Tjo for a previous access may nevertheless be greater than the current number Tj identifying the sending of the user request UR by the user.
  • This is the case when accessing programs broadcast in a loop with the same access control parameters ECMj or when accessing recorded programs, for example.
  • Step C of selecting the access control message number may then be followed by a step D of authorizing access by the user to the scrambled information as a function of a specific access criterion, starting from the origin Tjo of the timebase and over a time range corresponding to a plurality of individual time intervals defining a plurality of successive individual quanta of scrambled information.
  • For this reason, in FIG. 1a, Δ (Tjo, td, tf) represents the access time range assigned to the user, where:
      • jo represents the rank of the number Tjo defining the origin of the timebase;
      • td represents an offset of the numbers in the timebase relative to the above-mentioned origin Tjo; and
      • tf represents another offset of the numbers relative to the above-mentioned origin Tjo.
  • By way of a non-limiting example, the above-mentioned offsets can correspond to at least one individual time interval δ taken to be equal to the sending time of the access control message ECMj.
  • In this case, each successive individual time interval at the time j of receiving the message ECMj is denoted δ(j) and the corresponding individual quantum of information is denoted:
    δI* (j)(j)(I*)
  • It can thus be understood that, by means of the user request UR as formulated, the user is authorized to access the information ΔI*=Δ(Tjo, td, tf) (I*) over a plurality of individual time intervals δ(j) in the final step E in FIG. 1 for successive quanta of information δI*(j) over the time range ΔI*=Δ(Tjo, td, tf)
  • The purpose of FIG. 1 b is to illustrate parameters for defining the current access number corresponding to the user request, and previous user access numbers stored in the card in order to constitute the origin Tjo of the corresponding timebase, and for a start time td, and an end time tf relative to the origin Tjo of the timebase; the parameters Tjo, td, and tf therefore define the time range for access authorized in accordance with the specific access criteria, as mentioned above.
  • Line 1 in FIG. 1 b represents the succession of numbers for received messages ECMj, where j designates the rank of the current number for the corresponding message ECMj.
  • In relation to lines 2, 3 and 4 in FIG. 1 b:
      • the origin Tjo of the timebase is the most recent access stored in the user's card, for example the most recent non-free of charge access, to the program of scrambled information I* concerned;
      • td is the offset relative to the origin Tjo corresponding to the start of the time region, or time range, to which access is authorized on the basis of a specific access criterion; and
      • tf is the offset relative to the origin Tjo corresponding to the end of the time region, or time range, to which access is authorized in accordance with the specific access criterion.
  • With reference to lines 2, 3 and 4 in FIG. 1 b:
      • the time range, or interval, is backward for td≦0 and tf≦0;
      • the interval, or time range, is forward for td≧0 and tf≧0;
      • the time range, or interval, is a “straddling” time range, i.e. forward and backward, for td≦0 and tf≧0.
  • Specifically, although this is not limiting on the invention, the current number of a message ECMj is always non-decreasing during the transmission of a broadcast program. However, if the program is broadcast in a loop, or if it corresponds to a program recorded on a recorder and played back, the value Tjo stored in the card assigned to the subscriber may correspond to a previous access and be relative to the time interval, or time range, defined by Tjo, td, and tf, as represented in lines 2, 3, and 4 in FIG. 1 b. Use of the protocol of the present invention is beneficial in these three situations.
  • Different implementations of a number Tj satisfying a monotonic non-decreasing function are described below with reference to FIG. 1 c.
  • Line 1 of FIG. 1 c represents a monotonic non-decreasing function in the form of a continuously increasing function of the sending time for control messages ECMj. For example, each number Tj is constant over the individual time period δ(j) and satisfies the condition:
    T j−1 ≦T j ≦T j+1
  • Line 2 in FIG. 1 c represents a monotonic non-decreasing function in the form of a stepped increasing function of the sending time for control messages ECMj.
  • With particular reference to line 2 in this figure, it is clear that each control message ECMj may be repeated over one or more individual time intervals between the successive numbers Tj−1, Tj et seq. This mode of operation defines a timebase with a resolution other than the sending time for control messages ECMj.
  • As also represented in the same line 2, each number Tj may be defined by a timestamp. In the example given in FIG. 2, the timestamp is a time value expressed in seconds. Each step Tj−1, Tj et seq. is then defined by the time range represented by the two different timestamps, for example.
  • An object of the protocol of the present invention is to manage the number of viewings NV of the same program broadcast and/or recorded by a user, where each viewing may comprise access to the same program one or more times, access at two or more separate times being included the same viewing and, in this situation, since the number of viewings is unchanged, no additional amount is billed to the user in this kind of situation.
  • The change, however, from one access to another by the user in the same program under conditions other than the specific access above-mentioned criterion counts as two different viewings, one “viewing” and one “other viewing”, the other viewing leading to incrementing the number of viewings and to an additional amount being billed to the user, as described below.
  • Referring to FIG. 2, managing the number of viewings NV of programs at the request of the user and according to the specific access criterion in the above-defined time range and outside that time range, the access criterion may, as represented in FIG. 2, consist in a step E0 of defining a maximum authorized number of viewings NVM of the scrambled broadcast program containing the scrambled information I*. The protocol of the invention may further define a first Boolean variable AV whose “true” value represents authorization for forward access to the scrambled information I* beyond the origin and outside the above-defined time range without incrementing the number of viewings, with such access to the information beyond the origin and outside the time range being authorized on the basis of an access criterion separate from the specific access criterion defining access in the above-mentioned time range.
  • The protocol may also define a second Boolean variable AR whose “true” value is representative of authorization for backward access to the scrambled information before the origin and outside the time range on the basis of an access criterion different from the above-mentioned specific access criterion and without incrementing the number of viewings.
  • In a preferred embodiment of the protocol of the present invention, the access criterion specific to the above-defined access time range or region, in particular as defined by the offset parameters td and tf relative the origin Tjo of the timebase, may advantageously allow the user free access, i.e. unbilled access, in that range.
  • By way of purely illustrative example, it is specified that the Boolean variables AV and AR referred to above have the value 1 for the “true” value and the value 0 for the “false” value.
  • In the step E0 in FIG. 2, on the user sending the user request UR defined by the rank j of the number Tj of the corresponding access control message ECMj, there are available:
      • variables NV, Tjo if a previous access has been made to the same scrambled data program, Tjo representing the stored value serving as the origin for the next access resulting from the request UR, and NV designating the number of viewings already effected;
      • the authorized maximum number of viewings NVM;
      • the Boolean variables AV and AR; and
      • the time range Δ(Tjo, td, tf)
  • Finally, to implement the protocol of the present invention, it may be advantageous to initialize the number of viewings NV to zero if the user has made no accesses and thus has not viewed any corresponding scrambled data program.
  • In this case, and as represented in FIG. 2, the protocol of the invention may test for the existence of the variable NV in the step E1. This test is denoted:
    ∃(NV)?
  • In the event of a negative result of the test E1, i.e. if there is a variable NV equal to 0 for the scrambled information I* concerned, then a step E2 is executed which tests whether the number of viewings NV is less than the maximum number of viewings NVM.
  • It is clear, of course, that in this starting situation the result of the test E2 is generally always positive, since the number of viewings NV is equal to 0 in this situation.
  • In the event of a positive result of the test E2, a step E4 is executed which increments the value of the number of viewings by 1, in accordance with the following equation:
    NV=NV+1
  • Clearly, in this case, the access to the scrambled information program I* is the first access.
  • In this case, the step E4 may then be followed by a step E5 which, for the first viewing, updates the origin of the timebase, i.e. the value Tjo to the value Tj which is none other than the reception number for the user request UR, i.e. the reception number for the corresponding message ECMj.
  • The step E5 of updating the origin of the timebase may then be followed by access to the individual quantum of information δI*(j) in a step E6. Clearly, in this case, the first access corresponds to a first viewing and the access criterion applied is an access criterion different from the specific access criterion corresponding to free access.
  • But, in the event of a positive result of the above-mentioned test E1, because the value of NV is not equal to 0, there are at least one earlier access and at least one earlier viewing.
  • In this case, the step E1 is followed by a step E7 of testing whether the number of viewings NV is less than or equal to the authorized maximum number of viewings NVM.
  • In the event of a negative result from the test E7, access to the scrambled information is refused in the step E8 because the user has clearly exceeded the viewing quota NVM.
  • However, if the result of the test E7 is positive, the protocol of the invention then tests, in step E8, whether the current number Tj lies within the time range.
  • The step E8 test of whether the current number Tj is in the time range, satisfies the condition:
    (T jo +td)≦T j≦(T jo +tf)
  • In the event of a positive result from test E8, access to the individual quantum of scrambled information δI*(j) is authorized, in the above-described step E6, on the basis of the specific access criterion and during the scrambled information time range.
  • It is clear, of course, that access during the time range consists in particular in authorizing successive access to each quantum of information covering the time range, as mentioned above.
  • It is equally clear that, if the specific access criterion corresponds to a free access criterion, i.e. when there is nothing to be billed to the user, access is effected directly, in step E6, without incrementing the number of viewings NV.
  • However, if the result of the test E8 is negative, access to the scrambled information is authorized on the basis of an access criterion different from the specific access criterion, and is conditional upon the above-mentioned Boolean variables having the “true” value.
  • Clearly, given the values of the above-mentioned Boolean variables, it is possible to determine whether any new access, upstream or downstream of the above-mentioned origin, contributes or does not contribute to a new viewing.
  • Accordingly, if the current number Tj does not belong to the above-mentioned time range, i.e. in the event of a negative result from test E8, authorization of access on the basis of an access criterion different from the specific access criterion and conditional on a “true” value of a Boolean variables may consist, in a step E9 and as represented in FIG. 2, in submitting the current number Tj representative of the sending time of the user request UR and the first Boolean variable AV to a first logic test to verify whether the current number Tj is greater than or equal to the number Tjo for the origin and to verify that the first Boolean variable AV has the “true” value for authorizing forward access to the scrambled information.
  • The test E9 also submits the current number Tj and the second Boolean variable AR to a second logic test to verify whether the above-mentioned current number Tj is less than or equal to the number Tjo for the origin and to verify whether the second Boolean variable AR has the “true” value for authorizing backward access to the scrambled information.
  • In the test E9 in FIG. 2, the first and second logic tests satisfy the condition:
    (T j ≧T jo AND AV=1) OR (T j ≦T jo AND AR=1)
  • In the event of a positive result from test E9, i.e. in the event of a positive result of either of the above-mentioned first and second logic tests, then forward access, or backward access as the case may be, is authorized without incrementing the number of viewings of the scrambled information.
  • Clearly, for any user request UR corresponding to a reception number Tj outside the time range defined in the step E8 and greater than the number Tjo at the origin, the “true” value of the Boolean variable AV, indicating a forward request, i.e. continued viewing, indicates that the user wishes to resume the earlier viewing. This may be effected by the user to the detriment of the non-viewing of all the quanta of scrambled information from Tjo to Tj.
  • The same applies to the second logical test, where the current number Tj is this time lower than the origin number Tjo. This may be the case, for example, either on returning to a program broadcast in a loop or on rewinding a recording on a recorder. In the same way, in this kind of situation, the user wishes to view an earlier episode which may or may not have been accessed previously.
  • Authorization of forward access (or backward access as the case may be) without incrementing the number of viewings, following a positive result from test E9, entails executing the step of updating the origin number Tjo, which is updated to the value Tj, in step E5. Step E5 is then followed by step E6 which accesses the individual quantum of scrambled information δI*(j).
  • Otherwise if the result from test E9 is negative, since neither the first nor the second logical test is satisfied, the protocol of the invention tests in step E2 whether the number of viewings NV is less than the authorized maximum number of viewings NVM.
  • In the event of a negative result of above-mentioned test E2, access to the individual quantum of scrambled information δI*(j) is refused in step E3, the user having exhausted the quota of viewings for the program concerned. Otherwise, in the event of a positive result from test E2, the number of viewings NV is incremented by 1, in above-mentioned step E4, said step E4 being followed by authorization of forward access (or backward access as the case may be), to the scrambled information via above-mentioned updating step E5.
  • It is therefore clear that, because of the incrementation in the step E4, i.e. the user has chosen an access constituting a new viewing, the new viewing will be billed as such, the new access constituting a new viewing.
  • An embodiment of the protocol of the present invention for a service corresponding to a single rewinding of a recording on a device such as a recorder is described below with reference to FIG. 2.
  • By way of non-limiting example, in this situation, the maximum number of viewings NVM may be taken as equal to 1, for example, and the time interval or the time range for which access is authorized in accordance with the specific access criterion, and in particular in accordance with free access, is defined by the following parameters:
      • td<0
      • tf=0.
  • In this kind of application to the above-mentioned service, the Boolean variables are respectively forced as follows:
      • AV=1
      • AR=0.
  • Clearly, in this case, the user is assigned a maximum viewing time by rewinding, as defined above. Outside this interval, only forward viewing from the position Tjo is authorized, because of the “true” or “false” values of the above-mentioned Boolean variables.
  • A second embodiment of the protocol of the present invention is described below with reference to the same FIG. 2 in an application to a preview service.
  • The preview service in fact corresponds to free forward access authorizations relative to the origin of the timebase.
  • In a situation of this kind, the maximum number of viewings may be taken as equal to 1, for example: NVM=1. This example is not limiting on the invention.
  • The access time area according to the specific access criterion, such as the above-mentioned free access criterion, is then defined by:
      • td=0
      • tf>0.
  • In this case, for the preview service, the Boolean variables for the recorder forward and reverse control functions may be taken as equal to AV=0 and AR=0, respectively. In this case, in the context of the preview service, the user is authorized to view only in the above-mentioned time interval or time range a number of successive quanta of scrambled information determined by the magnitude |tf−td| determined in a specific manner. It is recalled that the magnitude of the above-mentioned time range may correspond to three minutes of viewing, for example.
  • A third embodiment of the protocol of the present invention is described below with reference to the same FIG. 2, in an application to controlling the number of viewings during the broadcasting of a program in a loop, for example.
  • In this application, the maximum number of viewings NVM for the scrambled information program concerned may be defined arbitrarily.
  • By way of non-limiting example, the magnitude of the time region for which access is authorized in accordance with the specific access criterion, i.e. free access, may be arbitrarily set at 0: td=0 AND tf=0.
  • In this case, it is clear that the user is authorized to consult any scrambled information program broadcast in looped mode in accordance with an access criterion different from the specific access criterion and corresponding to at least one of the access rights registered in the user's card being satisfied.
  • In this situation, only basic forward access is authorized, i.e. access to successive quanta of scrambled information, the Boolean variables taking the values:
      • AV=1
      • AR=0.

Claims (14)

1. A protocol for controlling access to information scrambled at a broadcast centre using a service key contained in a control word, the control word being encrypted by means of an operating key, the access control protocol consisting at least in sending said scrambled information and periodic access control messages, ECM messages, to at least one descrambling terminal associated with an access control module provided with a security processor, the ECM messages containing access criteria and the cryptogram of the control word, the control word and the cryptogram of the control word being changed periodically, access to said scrambled information at each descrambling terminal being conditional upon a “true” value for said access criteria when compared with at least one access right registered in the access control module, and then upon decrypting said cryptogram of the control word using the operating key, in order to recover said control word and to descramble said scrambled information, the protocol being characterized in that it further consists:
in assigning each access control message, ECM message, a number (Tj) satisfying a monotonic nondecreasing function, consecutive messages ECM, with successive numbers representing a timebase formed by a plurality of individual time intervals for sending successive individual quanta of scrambled information;
in detecting in each descrambling terminal the number (Tj) of each access control message, message ECMj, and then, in response to a user request (UR) from the user of said descrambling terminal for conditional controlled access to at least a portion of said scrambled information;
in selecting a number for an access control message, message ECMj the number corresponding to the sending time of said request, and constituting a time origin (Tjo) of said timebase; and
as a function of a specific access criterion, in authorizing said user to access said scrambled information from said origin (Tjo) of said timebase over a time range corresponding to a plurality of individual time intervals defining a plurality of successive individual quanta of scrambled information.
2. A protocol according to claim 1, characterized in that said time range is defined by a first offset (td) from said origin (Tjo) corresponding to the beginning of the access as a function of said specific access criterion, and a second offset (tf) corresponding to the end of the access as a function of said specific access criterion.
3. A protocol according to claim 1, characterized in that said monotonic non-decreasing function is a continuously increasing function of the sending time of the control messages ECMj.
4. A protocol according to claim 1, characterized in that said monotonic non-decreasing function is an increasing step function of the sending time of the control messages ECMj.
5. A protocol according to claim 4, characterized in that each step is defined by a constant number over a plurality of sending times of the control messages ECMj which defines a timebase with a resolution different from the sending time of the control messages ECMj.
6. A protocol according to claim 5, characterized in that each number is defined by a timestamp, each step being defined by the time range represented by two separate timestamps.
7. A protocol according to claim 2, characterized in that said specific access criterion corresponds to free access.
8. A protocol according to claim 2, characterized in that said time range is either an interval backwards from said origin, td≦0 AND tf≦0, or an interval forwards from said origin, td≧0 AND tf≧0, or a forward and backward interval, td≦0 AND tf≧0.
9. A protocol according to claim 1, characterized viewings (NV) at the request the user in accordance with said specific access criterion in said time range and outside said time range, the protocol consists at least:
in defining a maximum authorized number of viewings (NVM);
in testing whether the number of viewings (NV) is less than or equal to said authorized maximum number of viewings (NVM); and,
in the event of a negative result of said test, refusing access to the scrambled information; else
in testing whether said current number (Tj) is in said time range; and,
in the event of said current number (Tj) being in said time range; in authorizing access to said scrambled information on the basis of the specific access criterion during said time range; else
in authorizing access on the basis of a distinct access criterion other than specific access criterion and on condition that a Boolean variable representative of forward access authorization or of backward access authorization, respectively, presents a “true” value.
10. A protocol according to claim 9, characterized that it further consists:
in defining a first Boolean variable (AV) whose “true” value is representative of authorization of forward access to said scrambled information beyond said time range, on the basis of an access criterion other than said specific access criterion; and
in defining a second Boolean variable (AR) whose “true” value is representative of authorization of backward access to said scrambled information before said time range, on the basis of an access criterion other than said specific access criterion.
11. A protocol according to claim 9, characterized in that, if said current number (Tj) is not in said time range, said authorization of access based on an access criterion other than said specific access criterion and conditional upon the “true” value of said Boolean variables consists:
in submitting said current number (Tj) and said first Boolean variable (AV) to a first logical test to verify whether said current number (Tj) is equal to or greater than said origin number (Tjo) and to verify whether said first Boolean value is “true” in order to authorize forward access to said scrambled information or to a second logical test to verify whether said current number (Tj) is equal to or the less than said origin number (Tjo) and to verify whether the value of said second Boolean variable is “true” in order to authorize backward access to said scrambled information and, in the event of a positive result of either of the first or second logical tests:
in authorizing forward access, or backward access as the case may be to said scrambled information with no incrementing of the number of viewings and, in the event of a negative result of both the first and second logical tests:
in testing whether said number of viewings (NV) is less than the authorized maximum number of viewings (NVM); and
in the event of a negative result of said test, in refusing access to the scrambled information and incrementing said number of viewings (NV) by 1, else
in authorizing forward, respectively backward, access to said scrambled information.
12. A protocol according to claim 11, characterized in that, for a specific access control corresponding to a basic rewind service for a recording and an authorized maximum number of viewings NVM=1, said time range is a backward range defined by td<0 AND tf=0, the first Boolean variable is “true”, forward access being authorized, and the backward second Boolean variable is the complement of the “true” value, backward access not being authorized.
13. A protocol according to claim 11, characterized in that, for a specific access control corresponding to a free access preview service, said time range is a forward range defined by td=0 AND tf>0, the authorized maximum number of viewings is NVM=1, the first and the second Boolean variables are “false”, recording and/or backward access not being authorized.
14. A protocol according to claim 11, characterized in that, for looped transmission of scrambled information, said authorized maximum number of viewings is set a particular value, said time range for access to the scrambled information has a specific value, the first Boolean variable is “true” and the second Boolean value is “false”.
US10/506,501 2002-03-06 2003-03-05 Protocol for controlling access, through specific time ranges, to scrambled data Abandoned US20050125653A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0202857A FR2837055B1 (en) 2002-03-06 2002-03-06 PROTOCOL OF ACCESS CONTROL, BY RANGES OF SPECIFIC HOURS, TO ENRICHED INFORMATION
FR02/02857 2002-03-06
PCT/FR2003/000710 WO2003075571A1 (en) 2002-03-06 2003-03-05 Protocol for controlling access, through specific time ranges, to scrambled data

Publications (1)

Publication Number Publication Date
US20050125653A1 true US20050125653A1 (en) 2005-06-09

Family

ID=27763600

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/506,501 Abandoned US20050125653A1 (en) 2002-03-06 2003-03-05 Protocol for controlling access, through specific time ranges, to scrambled data

Country Status (12)

Country Link
US (1) US20050125653A1 (en)
EP (1) EP1488642B1 (en)
JP (1) JP4225486B2 (en)
KR (1) KR100813573B1 (en)
CN (1) CN1310515C (en)
AT (1) ATE394875T1 (en)
AU (1) AU2003227815A1 (en)
DE (1) DE60320772D1 (en)
DK (1) DK1488642T3 (en)
ES (1) ES2306868T3 (en)
FR (1) FR2837055B1 (en)
WO (1) WO2003075571A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050188192A1 (en) * 2003-12-19 2005-08-25 Jean-Pierre Vigarie Multiplex re-routing protection process and transmission system for implementing this process
US20060005258A1 (en) * 2004-01-07 2006-01-05 Nec Corporation Contents distribution system, method thereof, server, user terminal, encryption device, managing device and streaming device
US20090028331A1 (en) * 2006-05-04 2009-01-29 Nds Limited Scrambled Digital Data Item
CN107122678A (en) * 2017-04-28 2017-09-01 上海与德科技有限公司 Protect the method and device of product parameters

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7363366B2 (en) 2004-07-13 2008-04-22 Teneros Inc. Network traffic routing
US7363365B2 (en) 2004-07-13 2008-04-22 Teneros Inc. Autonomous service backup and migration
FR2910671B1 (en) * 2006-12-21 2009-04-03 Viaccess Sa METHOD FOR MANAGING THE NUMBER OF VISUALIZATIONS, SECURITY PROCESSOR AND TERMINAL FOR THIS METHOD
CN102149015A (en) * 2011-04-02 2011-08-10 北京互信通科技有限公司 Method and corresponding device for transmitting and broadcasting encrypted channel in digital television

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5548593A (en) * 1993-06-29 1996-08-20 Alcatel N. V. Resequencing method and resequencing device realizing such a method
US6005938A (en) * 1996-12-16 1999-12-21 Scientific-Atlanta, Inc. Preventing replay attacks on digital information distributed by network service providers
US6035038A (en) * 1996-06-28 2000-03-07 Thomson Multimedia S.A. Conditional access system and smartcard allowing such access
US6256393B1 (en) * 1998-06-23 2001-07-03 General Instrument Corporation Authorization and access control of software object residing in set-top terminals
US20010012366A1 (en) * 1999-12-22 2001-08-09 Van Rijnsoever Bartholomeus Johannes Conditional access system for controlling the access to a data content
US6363149B1 (en) * 1999-10-01 2002-03-26 Sony Corporation Method and apparatus for accessing stored digital programs
US20020076050A1 (en) * 2000-10-26 2002-06-20 Chen Annie On-Yee System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems
US20020087971A1 (en) * 2000-10-26 2002-07-04 Cochran Keith R. Communication protocol for content on demand system with callback time
US6584199B1 (en) * 1997-12-31 2003-06-24 Lg Electronics, Inc. Conditional access system and method thereof
US6978022B2 (en) * 2000-10-26 2005-12-20 General Instrument Corporation System for securing encryption renewal system and for registration and remote activation of encryption device
US7092729B1 (en) * 1999-07-05 2006-08-15 Thomson Licensing S.A. Method and apparatus for broadcasting and receiving entitlement management messages
US7116892B2 (en) * 2000-04-07 2006-10-03 Irdeto Access B.V. System for providing scrambled content, and system for descrambling scrambled content
US7203317B2 (en) * 2001-10-31 2007-04-10 Hewlett-Packard Development Company, L.P. System for enabling lazy-revocation through recursive key generation

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2764454A1 (en) * 1997-06-10 1998-12-11 Thomson Multimedia Sa CONDITIONAL ACCESS SYSTEM WITH PROGRAMMABLE ACCESS MODE
DE60020245T2 (en) * 1999-08-24 2006-01-26 General Instrument Corporation SYSTEM AND METHOD FOR SECURING ON-REQUEST DELIVERY OF PRE-CLOSED CONTENTS WITH ECM SUPPRESSION
US6363480B1 (en) * 1999-09-14 2002-03-26 Sun Microsystems, Inc. Ephemeral decryptability

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5548593A (en) * 1993-06-29 1996-08-20 Alcatel N. V. Resequencing method and resequencing device realizing such a method
US6035038A (en) * 1996-06-28 2000-03-07 Thomson Multimedia S.A. Conditional access system and smartcard allowing such access
US6005938A (en) * 1996-12-16 1999-12-21 Scientific-Atlanta, Inc. Preventing replay attacks on digital information distributed by network service providers
US6584199B1 (en) * 1997-12-31 2003-06-24 Lg Electronics, Inc. Conditional access system and method thereof
US6256393B1 (en) * 1998-06-23 2001-07-03 General Instrument Corporation Authorization and access control of software object residing in set-top terminals
US7092729B1 (en) * 1999-07-05 2006-08-15 Thomson Licensing S.A. Method and apparatus for broadcasting and receiving entitlement management messages
US6363149B1 (en) * 1999-10-01 2002-03-26 Sony Corporation Method and apparatus for accessing stored digital programs
US6633644B2 (en) * 1999-12-22 2003-10-14 Koninklijke Philips Electronics N.V. Conditional access system for controlling the access to a data content
US20010012366A1 (en) * 1999-12-22 2001-08-09 Van Rijnsoever Bartholomeus Johannes Conditional access system for controlling the access to a data content
US7116892B2 (en) * 2000-04-07 2006-10-03 Irdeto Access B.V. System for providing scrambled content, and system for descrambling scrambled content
US20020076050A1 (en) * 2000-10-26 2002-06-20 Chen Annie On-Yee System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems
US20020087971A1 (en) * 2000-10-26 2002-07-04 Cochran Keith R. Communication protocol for content on demand system with callback time
US6978022B2 (en) * 2000-10-26 2005-12-20 General Instrument Corporation System for securing encryption renewal system and for registration and remote activation of encryption device
US7080397B2 (en) * 2000-10-26 2006-07-18 General Instrument Corporation Communication protocol for content on demand system with callback time
US7257227B2 (en) * 2000-10-26 2007-08-14 General Instrument Corporation System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems
US7203317B2 (en) * 2001-10-31 2007-04-10 Hewlett-Packard Development Company, L.P. System for enabling lazy-revocation through recursive key generation

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050188192A1 (en) * 2003-12-19 2005-08-25 Jean-Pierre Vigarie Multiplex re-routing protection process and transmission system for implementing this process
US20060005258A1 (en) * 2004-01-07 2006-01-05 Nec Corporation Contents distribution system, method thereof, server, user terminal, encryption device, managing device and streaming device
US20090028331A1 (en) * 2006-05-04 2009-01-29 Nds Limited Scrambled Digital Data Item
US9338405B2 (en) 2006-05-04 2016-05-10 Cisco Technology, Inc. Scrambled digital data item
CN107122678A (en) * 2017-04-28 2017-09-01 上海与德科技有限公司 Protect the method and device of product parameters

Also Published As

Publication number Publication date
AU2003227815A1 (en) 2003-09-16
WO2003075571A1 (en) 2003-09-12
EP1488642A1 (en) 2004-12-22
FR2837055A1 (en) 2003-09-12
EP1488642B1 (en) 2008-05-07
DK1488642T3 (en) 2008-06-23
DE60320772D1 (en) 2008-06-19
CN1640128A (en) 2005-07-13
ES2306868T3 (en) 2008-11-16
ATE394875T1 (en) 2008-05-15
JP4225486B2 (en) 2009-02-18
JP2005519539A (en) 2005-06-30
FR2837055B1 (en) 2004-06-11
KR100813573B1 (en) 2008-03-17
KR20040093087A (en) 2004-11-04
CN1310515C (en) 2007-04-11

Similar Documents

Publication Publication Date Title
US6725459B2 (en) Descrambling device for use in a conditional access system
US5594794A (en) Method and apparatus for free previews of communication network services
JP4216534B2 (en) Time verification system
US7245720B2 (en) Method for controlling the use of a program signal in a broadcast system, and control device for a receiver for carrying out such a method
EP1968316A1 (en) Method to control the access to conditional access audio/video content
US20050025312A1 (en) Distribution of encrypted information
US8520856B2 (en) Controlling the validity period of a decryption key
KR100697059B1 (en) Conditional access system for controlling the access to a data content
US20050125653A1 (en) Protocol for controlling access, through specific time ranges, to scrambled data
JP5127109B2 (en) Method and apparatus for allowing unconfirmed viewing time on addressable pay television
RU2300849C2 (en) Method for time-interval based compilation of broadcast service rates
US20040240840A1 (en) System for recording and playback of television signals from a plurality of television channels
KR100933262B1 (en) Method of transmitting digital data representing content
JP3420667B2 (en) IC card for decoder and scramble system
JPS61129930A (en) Direct broadcasting satellite system
JP2001333412A (en) Pay broadcast receiver and pay broadcast time shift viewing method
JP2002218431A (en) Broadcasting receiver, module used for the receiver and broadcasting receiving method

Legal Events

Date Code Title Description
AS Assignment

Owner name: VIACCESS, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BECKER, CLAUDIA;CODET, ANDRE;FEVRIER, PIERRE;AND OTHERS;REEL/FRAME:016295/0081

Effective date: 20040819

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION